This table aggregates membership for all versions of the DvHistory object.

Versioned schema members

Any object member specific to a range of versions is indicated in its description, at what version the member was either introduced or removed. Any listed data member with no version number is common to all versions of the object.

MemberTypeDescription
Dv​History: Domain Validation (DV) challenges are used by Let's Encrypt to verify domain control.
domainStringrequired: The domain being validated.
domain​HistoryDv​History.​domain​History[]required: A history record for a single domain.
Dv​History.domain​History[]: A history record for a single domain.
challengesDv​History.​domain​History[].​challenges[]required: Challenges used for validation.
domainString, NullDomain that is being validated.
errorString, NullCurrent validation status for domains not yet validated.
expiresString, NullTimestamp when this token or validation will expire. Sample 2017-12-05T18:57:07z.
full​PathString, NullThe URL that Let's Encrypt returns for the token.
redirect​Full​PathString, NullThe URL that Let's Encrypt returns. This is the path to the server to which you want to redirect and find the token.
request​TimestampString, NullThe timestamp when the domain was successfully requested. Sample 2014-08-12T18:57:07z.
response​BodyString, NullThe data Let's Encrypt expects to find served at full​Path URL.
statusString, NullThe domain validation status.
tokenString, NullThe validation token issued by Let's Encrypt.
validated​TimestampString, NullThe timestamp when the domain was successfully validated. Sample 2014-08-12T18:57:07z.
validation​RecordsDv​History.​domain​History[].​validation​Records[]required: Validation attempt.
validation​StatusString, NullStatus of the domain validation process.
Dv​History.domain​History[].challenges[]: Challenges used for validation.
errorString, NullValidation status for this challenge.
full​PathString, NullPath where Let's Encrypt respects and expects to find token as content.
redirect​Full​PathString, NullThe URL where Akamai publishes response​Body for Let's Encrypt to validate http-01 challenges. The client can configure a redirect at full​Path to redirect requests to this redirect​Full​Path URL, keeping in mind that the token may change over time.
response​BodyString, NullThe data Let's Encrypt expects to find served at full​Path URL.
statusString, NullThe domain validation status. Status include valid and pending.
tokenString, NullThe validation token issued by Let's Encrypt.
typeString, NullChallenge type. Current types include http-01 and dns-01.
validation​RecordsDv​History.​domain​History[].​challenges[].​validation​Records[]required: The records that you send to Let's Encrypt to validate your domain.
Dv​History.domain​History[].challenges[].validation​Records[]: The records that you send to Let's Encrypt to validate your domain.
authoritiesArray, NullValidation authorities.
hostnameString, NullThe name being validated.
portString, NullPort used for validation.
resolved​IpArray, NullIPs resolved for name being validated.
tried​IpString, NullIP from resolved​Ip tried for this validation.
urlString, NullURL attempted validated.
used​IpString, NullIP from resolved​Ip used for this validation.
Dv​History.domain​History[].validation​Records[]: Validation attempt.
hostnameString, NullThe records that Let's Encrypt returns to you to validate your domain.
portString, NullPort used for validation.
resolved​IpArray, NullIP address
urlString, NullURL attempted validated.
used​IpString, NullIP from resolved​Ip used for this validation.

Sample v2 object

{
    "acknowledgementDeadline": null,
    "pendingState": {
        "pendingCertificate": {
            "certificateType": "third-party",
            "fullCertificate": "-----BEGIN CERTIFICATE-----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\nVQBpto9JgDmt0yqsdFdLrZlpsIQwpLqdgKZlSw==\n-----END CERTIFICATE-----",
            "signatureAlgorithm": "SHA-256"
        },
        "pendingNetworkConfiguration": {
            "disallowedTlsVersions": [
                "TLSv1_2"
            ],
            "mustHaveCiphers": "ak-akamai-default2016q3",
            "networkType": null,
            "preferredCiphers": "ak-akamai-default",
            "sni": null
        }
    },
    "validationResult": {
        "errors": null,
        "warnings": [
            {
                "message": "[SAN name [san9.example.com] has been removed from the certificate. It is still live on the network., SAN name [san8.example.com] has been removed from the certificate. It is still live on the network.]",
                "messageCode": "no-code"
            }
        ]
    },
    "validationResultHash": "da39a3ee5e6b4b0d3255bfef95601890afd80709"
}

Sample v4 object

{
    "acknowledgementDeadline": null,
    "pendingState": {
        "pendingCertificate": {
            "certificateType": "third-party",
            "fullCertificate": "-----BEGIN CERTIFICATE-----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\nVQBpto9JgDmt0yqsdFdLrZlpsIQwpLqdgKZlSw==\n-----END CERTIFICATE-----",
            "ocspStapled": "false",
            "ocspUris": null,
            "signatureAlgorithm": "SHA-256"
        },
        "pendingNetworkConfiguration": {
            "disallowedTlsVersions": [
                "TLSv1_2"
            ],
            "dnsNameSettings": null,
            "mustHaveCiphers": "ak-akamai-default2016q3",
            "networkType": null,
            "ocspStapling": "not-set",
            "preferredCiphers": "ak-akamai-default",
            "quicEnabled": "false",
            "sniOnly": "false"
        }
    },
    "validationResult": {
        "errors": null,
        "warnings": [
            {
                "message": "[SAN name [san9.example.com] has been removed from the certificate. It is still live on the network., SAN name [san8.example.com] has been removed from the certificate. It is still live on the network.]",
                "messageCode": "no-code"
            }
        ]
    },
    "validationResultHash": "da39a3ee5e6b4b0d3255bfef95601890afd80709"
}

Sample v5 object

{
    "acknowledgementDeadline": null,
    "pendingState": {
        "pendingCertificates": [
            {
                "certificateType": "third-party",
                "fullCertificate": "-----BEGIN CERTIFICATE-----\nMIID2 ... <sample - removed for readability> .... KZlSw==\n-----END CERTIFICATE-----",
                "keyAlgorithm": "RSA",
                "ocspStapled": "false",
                "ocspUris": null,
                "signatureAlgorithm": "SHA-256"
            }
        ],
        "pendingNetworkConfiguration": {
            "disallowedTlsVersions": [
                "TLSv1_2"
            ],
            "dnsNameSettings": null,
            "mustHaveCiphers": "ak-akamai-default2016q3",
            "networkType": null,
            "ocspStapling": "not-set",
            "preferredCiphers": "ak-akamai-default",
            "quicEnabled": "false",
            "sniOnly": "false"
        }
    },
    "validationResult": {
        "errors": null,
        "warnings": [
            {
                "message": "[SAN name [san9.example.com] has been removed from the certificate. It is still live on the network., SAN name [san8.example.com] has been removed from the certificate. It is still live on the network.]",
                "messageCode": "no-code"
            }
        ]
    },
    "validationResultHash": "da39a3ee5e6b4b0d3255bfef95601890afd80709"
}